Messenger Matrix (German / English)
The following matrix provides an overview of the different (technical) features of various messengers. Click on the matrix to open a larger view - the current status is noted at the top left
👉🏼 English:
https://www.messenger-matrix.de/messenger-matrix-en.html
👉🏼 German:
https://www.messenger-matrix.de/messenger-matrix.html
#security #privacy #sustainability #messenger #kuketz
📡 @nogoolag 📡 @blackbox_archiv
The following matrix provides an overview of the different (technical) features of various messengers. Click on the matrix to open a larger view - the current status is noted at the top left
👉🏼 English:
https://www.messenger-matrix.de/messenger-matrix-en.html
👉🏼 German:
https://www.messenger-matrix.de/messenger-matrix.html
#security #privacy #sustainability #messenger #kuketz
📡 @nogoolag 📡 @blackbox_archiv
Sanctioned Firm Accused of Helping Russian Intelligence Was Part of Microsoft’s Early Vuln Access Program — MAPP
A little-seen report issued last month by the Atlantic Council described in detail what a source confirms was the company’s alleged activities on behalf of the Russian government.
A Moscow-based firm that the U.S. Treasury Department put on a sanctions list on Thursday for helping Russian intelligence agencies engage in offensive hacking operations, has long been a partner in a controversial Microsoft program that gives private security vendors advance access to information about vulnerabilities in Microsoft products.
The company, Positive Technologies, is part of the Microsoft Active Protections Program (MAPP), which includes nearly 100 software companies who receive advance information about software vulnerabilities that Microsoft is working to patch — before the information and patches are released to the general public. This information can include what’s known as proof-of-concept code that demonstrates how the vulnerability can be exploited to hack systems. A leak of this critically sensitive information significantly shortens the time an adversary would need to develop their own exploit for the vulnerability.
Microsoft told the Associated Press, which first reported the link to MAPP, that it would be removing Positive Technologies from the program.
MAPP recently came under scrutiny after hackers linked to China began exploiting vulnerabilities in Microsoft Exchange servers before Microsoft went public with patches. Microsoft has reportedly been investigating whether a partner in MAPP may have leaked information Microsoft provided, inadvertently or intentionally, to actors who used it to exploit Exchange servers.
“Some of the tools used in the second wave of the attack [against Microsoft Exchange servers] … believed to have begun on Feb. 28, bear similarities to ‘proof of concept’ attack code that Microsoft distributed to antivirus companies and other security partners on Feb. 23,” the Wall Street Journal reported last month. Microsoft didn’t release a public patch to fix the vulnerabilities until March 2.
https://zetter.substack.com/p/sanctioned-firm-accused-of-helping
#MAPP #usa #russia #china #hacker #microsoft #vulnerabilities #exchange #server
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
A little-seen report issued last month by the Atlantic Council described in detail what a source confirms was the company’s alleged activities on behalf of the Russian government.
A Moscow-based firm that the U.S. Treasury Department put on a sanctions list on Thursday for helping Russian intelligence agencies engage in offensive hacking operations, has long been a partner in a controversial Microsoft program that gives private security vendors advance access to information about vulnerabilities in Microsoft products.
The company, Positive Technologies, is part of the Microsoft Active Protections Program (MAPP), which includes nearly 100 software companies who receive advance information about software vulnerabilities that Microsoft is working to patch — before the information and patches are released to the general public. This information can include what’s known as proof-of-concept code that demonstrates how the vulnerability can be exploited to hack systems. A leak of this critically sensitive information significantly shortens the time an adversary would need to develop their own exploit for the vulnerability.
Microsoft told the Associated Press, which first reported the link to MAPP, that it would be removing Positive Technologies from the program.
MAPP recently came under scrutiny after hackers linked to China began exploiting vulnerabilities in Microsoft Exchange servers before Microsoft went public with patches. Microsoft has reportedly been investigating whether a partner in MAPP may have leaked information Microsoft provided, inadvertently or intentionally, to actors who used it to exploit Exchange servers.
“Some of the tools used in the second wave of the attack [against Microsoft Exchange servers] … believed to have begun on Feb. 28, bear similarities to ‘proof of concept’ attack code that Microsoft distributed to antivirus companies and other security partners on Feb. 23,” the Wall Street Journal reported last month. Microsoft didn’t release a public patch to fix the vulnerabilities until March 2.
https://zetter.substack.com/p/sanctioned-firm-accused-of-helping
#MAPP #usa #russia #china #hacker #microsoft #vulnerabilities #exchange #server
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Zero Day
Sanctioned Firm Accused of Helping Russian Intelligence Was Part of Microsoft’s Early Vuln Access Program — MAPP
A little-seen report issued last month by the Atlantic Council described in detail what a source confirms was the company’s alleged activities on behalf of the Russian government.
Justice for Dr. Richard Matthew Stallman
Dr. Richard Matthew Stallman (born 16 March 1953), known by his initials rms (occasionally uppercase RMS) is an American computer scientist, programmer, philosopher, free/libre software movement activist and ethical hacker. He pioneered the campaign for software to be distributed in such manner that its users receive the fundamental freedoms to use, study, distribute, and modify it. Software that respects these four freedoms is termed free software (or libre software).
https://jorgemorais.gitlab.io/justice-for-rms/
#tolerance #rms #freesoftware #gnu #healingcommunities #restoretruth #reinstallrms #freethought #stallman
📡 @nogoolag 📡 @blackbox_archiv
Dr. Richard Matthew Stallman (born 16 March 1953), known by his initials rms (occasionally uppercase RMS) is an American computer scientist, programmer, philosopher, free/libre software movement activist and ethical hacker. He pioneered the campaign for software to be distributed in such manner that its users receive the fundamental freedoms to use, study, distribute, and modify it. Software that respects these four freedoms is termed free software (or libre software).
https://jorgemorais.gitlab.io/justice-for-rms/
#tolerance #rms #freesoftware #gnu #healingcommunities #restoretruth #reinstallrms #freethought #stallman
📡 @nogoolag 📡 @blackbox_archiv
jorgemorais.gitlab.io
Justice for Dr. Richard Matthew Stallman
Developers, it’s time for you to choose a side - Clean up the web!
Will you help rid the web of privacy-invading tracking or be complicit in it?
🚮 Remove third-party scripts from Google, Facebook, etc.
This includes Google Analytics (one of the most prevalent trackers in the world), YouTube videos, Facebook login widgets, etc.
These scripts enable people farmers like Google and Facebook to track people across the web as they go from site to site. If you embed them in your site, you’re complicit in enabling this tracking.
And yes, that absolutely includes fucking Google AMP.
https://cleanuptheweb.org/
👉🏼 Read as well: Nobody is flying to join Google’s FLoC - #Brave, #Vivaldi, #Edge, and #Mozilla are all out
https://www.theverge.com/2021/4/16/22387492/google-floc-ad-tech-privacy-browsers-brave-vivaldi-edge-mozilla-chrome-safari
#cleanuptheweb #floc #google #DeleteGoogle #facebook #DeleteFacebook #tracking #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Will you help rid the web of privacy-invading tracking or be complicit in it?
🚮 Remove third-party scripts from Google, Facebook, etc.
This includes Google Analytics (one of the most prevalent trackers in the world), YouTube videos, Facebook login widgets, etc.
These scripts enable people farmers like Google and Facebook to track people across the web as they go from site to site. If you embed them in your site, you’re complicit in enabling this tracking.
And yes, that absolutely includes fucking Google AMP.
https://cleanuptheweb.org/
👉🏼 Read as well: Nobody is flying to join Google’s FLoC - #Brave, #Vivaldi, #Edge, and #Mozilla are all out
https://www.theverge.com/2021/4/16/22387492/google-floc-ad-tech-privacy-browsers-brave-vivaldi-edge-mozilla-chrome-safari
#cleanuptheweb #floc #google #DeleteGoogle #facebook #DeleteFacebook #tracking #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
The Verge
Nobody is flying to join Google’s FLoC
The future of the web is at stake
Windows 10 KB5001330: Watch out for these critical issues in latest update
Some configurations of Windows 10 are encountering more serious problems thanks to a recent update “KB5001330”, with users reporting installation issues, performance issues, temporary user profile bug and worrying system crash.
Earlier this week, Microsoft published new April 2021 cumulative updates for supported versions of the OS. For version 20H2/2004, Microsoft released Windows 10 KB5001330, a mandatory security update aimed at fixing several vulnerabilities and issues caused by the previous update, including problems with the printers.
According to multiple reports (1, 2, 3, 4) over on the social media sites, Feedback Hub and our comments section, it looks as though there is a growing number of users unable to install the latest Windows update on their hardware.
If your device is affected and is trying to update directly to April 2021 security patch, it could fail with one of the following error messages:
0x800f081f
0x800f0984
0x800f0922
0x800f081f error when downloading KB5001330 update has been reported by a lot of users in the Feedback Hub and our comments section.
https://www.windowslatest.com/2021/04/16/windows-10-kb5001330-fps-drop-installation-failure-bsod/
#windows #update #installation #failure
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Some configurations of Windows 10 are encountering more serious problems thanks to a recent update “KB5001330”, with users reporting installation issues, performance issues, temporary user profile bug and worrying system crash.
Earlier this week, Microsoft published new April 2021 cumulative updates for supported versions of the OS. For version 20H2/2004, Microsoft released Windows 10 KB5001330, a mandatory security update aimed at fixing several vulnerabilities and issues caused by the previous update, including problems with the printers.
According to multiple reports (1, 2, 3, 4) over on the social media sites, Feedback Hub and our comments section, it looks as though there is a growing number of users unable to install the latest Windows update on their hardware.
If your device is affected and is trying to update directly to April 2021 security patch, it could fail with one of the following error messages:
0x800f081f
0x800f0984
0x800f0922
0x800f081f error when downloading KB5001330 update has been reported by a lot of users in the Feedback Hub and our comments section.
https://www.windowslatest.com/2021/04/16/windows-10-kb5001330-fps-drop-installation-failure-bsod/
#windows #update #installation #failure
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Windows Latest
Windows 10 KB5001330 issues: FPS drop, system crashes
Some configurations of Windows 10 are encountering more serious problems thanks to a recent update “KB5001330”, with users reporting installation issues, performance issues, temporary user profile bug and worrying system crash. Earlier this week, Microsoft…
Servicing the Windows Subsystem for Linux (WSL) 2 Linux kernel
Note: This blog post is co-authored by the awesome WSL dev Pierre Boulay. Thanks Pierre! 😊
We’ve just shipped the 5.10.16.3 WSL 2 Linux kernel version to Windows Insiders which brings exciting new changes: Support for the LUKS disk encryption, and some long-awaited bug fixes. We’d like to seize this opportunity to highlight these improvements and show you how these changes land on your Windows machine no matter your Windows version.
New feature addition: Support for LUKS disk encryption
This kernel update adds support for LUKS disk format. Such disks can now we accessed using wsl –mount.
LUKS disks can be mounted through the following steps: (Refer to distro specific instructions to install cryptsetup if needed).
https://devblogs.microsoft.com/commandline/servicing-the-windows-subsystem-for-linux-wsl-2-linux-kernel/
#microsoft #linux #kernel #wsl
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Note: This blog post is co-authored by the awesome WSL dev Pierre Boulay. Thanks Pierre! 😊
We’ve just shipped the 5.10.16.3 WSL 2 Linux kernel version to Windows Insiders which brings exciting new changes: Support for the LUKS disk encryption, and some long-awaited bug fixes. We’d like to seize this opportunity to highlight these improvements and show you how these changes land on your Windows machine no matter your Windows version.
New feature addition: Support for LUKS disk encryption
This kernel update adds support for LUKS disk format. Such disks can now we accessed using wsl –mount.
LUKS disks can be mounted through the following steps: (Refer to distro specific instructions to install cryptsetup if needed).
https://devblogs.microsoft.com/commandline/servicing-the-windows-subsystem-for-linux-wsl-2-linux-kernel/
#microsoft #linux #kernel #wsl
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Microsoft News
Servicing the Windows Subsystem for Linux (WSL) 2 Linux kernel
Note: This blog post is co-authored by the awesome WSL dev Pierre Boulay. Thanks Pierre! 😊 We’ve just shipped the 5.10.16.3 WSL 2 Linux kernel version to Windows Insiders which brings exciting new changes: Support for the LUKS disk encryption, and some long…
IMGUI Clipboard bug caused by Bitcoin address seeking malware
User submits a mysterious clipboard issue
@PathogenDavid patiently digs into system locales, encoding conversions, line-endings etc., fails to repro but somehow finds a fix involving line-endings format.
- Someones shows up with an answer *ouch*
https://nitter.pussthecat.org/ocornut/status/1383002610790174721
#IMGUI #clipboard #bug #bitcoin #malware
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
User submits a mysterious clipboard issue
@PathogenDavid patiently digs into system locales, encoding conversions, line-endings etc., fails to repro but somehow finds a fix involving line-endings format.
- Someones shows up with an answer *ouch*
https://nitter.pussthecat.org/ocornut/status/1383002610790174721
#IMGUI #clipboard #bug #bitcoin #malware
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
ndss2021_1C-3_23159_paper.pdf
430.5 KB
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Contact discovery allows users of mobile messengers to conveniently connect with people in their address book.
In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, largescale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service.
https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf
#contact #messenger #telegram #whatsapp #signal #crawling #attacks #study #pdf
📡 @nogoolag 📡 @blackbox_archiv
Contact discovery allows users of mobile messengers to conveniently connect with people in their address book.
In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, largescale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service.
https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf
#contact #messenger #telegram #whatsapp #signal #crawling #attacks #study #pdf
📡 @nogoolag 📡 @blackbox_archiv
Bug allows running tcpdump without root through xscreensaver on Debian
Hello, I noticed that at least debian (maybe others) ship xscreensaver
hack with cap_net_raw enabled:
socket. I wrote a quick exploit, this script will run tcpdump without
needing root.
necessary, so continuing the discussion here.
Summary of discussion so far:
https://www.openwall.com/lists/oss-security/2021/04/17/1
#tcpdump #xscreensaver #debian
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Hello, I noticed that at least debian (maybe others) ship xscreensaver
hack with cap_net_raw enabled:
$ getcap /usr/libexec/xscreensaver/sonarThat seems like a bug, you can just load some driver and get a raw
/usr/libexec/xscreensaver/sonar cap_net_raw=p
socket. I wrote a quick exploit, this script will run tcpdump without
needing root.
$ bash sock.shI sent a report to debian, jwz and mesa. We concluded no embargo is
17:43:55.000000 IP (tos 0x0, ttl 64, id 14541, offset 0, flags [DF], proto ICMP (1), length 84)
debian > sfo07s17-in-f78.1e100.net: ICMP echo request, id 59166, seq 1, length 64
17:43:55.000000 IP (tos 0x0, ttl 128, id 42276, offset 0, flags [none], proto ICMP (1), length 84)
sfo07s17-in-f78.1e100.net > debian: ICMP echo reply, id 59166, seq 1, length 64
necessary, so continuing the discussion here.
Summary of discussion so far:
https://www.openwall.com/lists/oss-security/2021/04/17/1
#tcpdump #xscreensaver #debian
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Domino's India database likely hacked, 1 million credit card details leaked along with mail IDs, cell numbers
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
Hackers reportedly have access to Domino’s India 13TB of internal data. Employee details, order, and credit card details of customers have likely been compromised. The hackers are aiming to sell the entire database for $550,000.
Popular pizza outlet Domino’s India seems to have fallen victim to a cyber attack. According to Alon Gal co-founder of an Israeli cybercrime intelligence, the hackers have access to Domino’s India 13TB of internal data which includes employee details of over 250 employees across verticals such as IT, Legal, Finance, Marketing, Operations, etc.
The hackers claim to have got all customer details and 18 crore order details which include customer's names, phone numbers, email IDs, delivery address, payment details including more than 10 lakh credit card details used to purchase on Domino’s India app.
Further, the hackers are aiming to sell the entire data to a single buyer. According to Alon Gal, the hackers are looking for $550,000 (around Rs 4 crores) for the entire database. The hackers also have plans to build a search portal to enable querying the data.
The sale is apparently happening in the dark web and likely on a website frequented by cyber scammers. For now, Domino's India has neither confirmed nor denied that data of its consumers has been stolen or leaked from its servers.
https://www.indiatoday.in/technology/news/story/domino-s-india-database-likely-hacked-1-million-credit-card-details-leaked-along-with-mail-ids-cell-numbers-1792305-2021-04-18
#dominos #india #hacker #attack #hacked #database #leak #breach
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
Hackers reportedly have access to Domino’s India 13TB of internal data. Employee details, order, and credit card details of customers have likely been compromised. The hackers are aiming to sell the entire database for $550,000.
Popular pizza outlet Domino’s India seems to have fallen victim to a cyber attack. According to Alon Gal co-founder of an Israeli cybercrime intelligence, the hackers have access to Domino’s India 13TB of internal data which includes employee details of over 250 employees across verticals such as IT, Legal, Finance, Marketing, Operations, etc.
The hackers claim to have got all customer details and 18 crore order details which include customer's names, phone numbers, email IDs, delivery address, payment details including more than 10 lakh credit card details used to purchase on Domino’s India app.
Further, the hackers are aiming to sell the entire data to a single buyer. According to Alon Gal, the hackers are looking for $550,000 (around Rs 4 crores) for the entire database. The hackers also have plans to build a search portal to enable querying the data.
The sale is apparently happening in the dark web and likely on a website frequented by cyber scammers. For now, Domino's India has neither confirmed nor denied that data of its consumers has been stolen or leaked from its servers.
https://www.indiatoday.in/technology/news/story/domino-s-india-database-likely-hacked-1-million-credit-card-details-leaked-along-with-mail-ids-cell-numbers-1792305-2021-04-18
#dominos #india #hacker #attack #hacked #database #leak #breach
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
India Today
Domino's India database likely hacked, 1 million credit card details leaked along with mail IDs, cell numbers
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
Malware Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs
A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps.
XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload modules to imitate legitimate Mac apps, which are ultimately responsible for infecting local Xcode projects and injecting the main payload to execute when the compromised project builds.
XCSSET modules come with the capabilities to steal credentials, capture screenshots, inject malicious JavaScript into websites, plunder user data from different apps, and even encrypt files for a ransom.
Then in March 2021, Kaspersky researchers uncovered XCSSET samples compiled for the new Apple M1 chips, suggesting that the malware campaign was not only ongoing but also that adversaries are actively adapting their executables and porting them to run on new Apple Silicon Macs natively.
https://thehackernews.com/2021/04/malware-spreads-via-xcode-projects-now.html
#malware #xcode #apple #macs
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps.
XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload modules to imitate legitimate Mac apps, which are ultimately responsible for infecting local Xcode projects and injecting the main payload to execute when the compromised project builds.
XCSSET modules come with the capabilities to steal credentials, capture screenshots, inject malicious JavaScript into websites, plunder user data from different apps, and even encrypt files for a ransom.
Then in March 2021, Kaspersky researchers uncovered XCSSET samples compiled for the new Apple M1 chips, suggesting that the malware campaign was not only ongoing but also that adversaries are actively adapting their executables and porting them to run on new Apple Silicon Macs natively.
https://thehackernews.com/2021/04/malware-spreads-via-xcode-projects-now.html
#malware #xcode #apple #macs
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
DDoS attack trends for 2021 Q1
Last week was Developer Week at Cloudflare. During that week, our teams released a bunch of cool new products, including a bunch of improvements to Workers. And it's not just our customers that love deploying apps with Workers, but also our engineering teams. Workers is also what powers our Internet traffic and attack trends on Cloudflare Radar. Today, along with this deep-dive analysis blog, we’re excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Last month, we introduced our autonomous edge DDoS (Distributed Denial of Service) protection system and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networks’ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All of this is done autonomously, i.e., without requiring centralized consensus.
Today, we’d like to share the latest DDoS insights and trends that are based on attacks that our system mitigated during the first quarter of 2021. When we analyze attacks, we calculate the “DDoS activity” rate, which is the percent of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a data center that sees more traffic and therefore also more attacks.
https://blog.cloudflare.com/ddos-attack-trends-for-2021-q1/
#ddos #attack #trends #cloudflare
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Last week was Developer Week at Cloudflare. During that week, our teams released a bunch of cool new products, including a bunch of improvements to Workers. And it's not just our customers that love deploying apps with Workers, but also our engineering teams. Workers is also what powers our Internet traffic and attack trends on Cloudflare Radar. Today, along with this deep-dive analysis blog, we’re excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Last month, we introduced our autonomous edge DDoS (Distributed Denial of Service) protection system and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networks’ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All of this is done autonomously, i.e., without requiring centralized consensus.
Today, we’d like to share the latest DDoS insights and trends that are based on attacks that our system mitigated during the first quarter of 2021. When we analyze attacks, we calculate the “DDoS activity” rate, which is the percent of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a data center that sees more traffic and therefore also more attacks.
https://blog.cloudflare.com/ddos-attack-trends-for-2021-q1/
#ddos #attack #trends #cloudflare
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The Cloudflare Blog
DDoS attack trends for 2021 Q1
Today, along with this deep-dive analysis blog, we’re excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Neural Network Telegram Bot
Neural network Telegram bot with StyleGAN and GPT-2
The Beginning
So we have already played with different neural networks. Cursed image generation using GANs, deep texts from GPT-2 — we have seen it all.
This time I wanted to create a neural entity that would act like a beauty blogger. This meant it would have to post pictures like Instagram influencers do and generate the same kind of narcissistic texts.
Initially I planned to post the neural content on Instagram but using the Facebook Graph API which is needed to go beyond read-only was too painful for me. So I reverted to Telegram which is one of my favorite social products overall.
The name of the entity/channel (Aida Enelpi) is a bad neural-oriented pun mostly generated by the bot itself.
https://guitargz.github.io/posts/202104151136-neural-network-telegram-bot/
#neural #network #telegram #bot
📡 @nogoolag 📡 @blackbox_archiv
Neural network Telegram bot with StyleGAN and GPT-2
The Beginning
So we have already played with different neural networks. Cursed image generation using GANs, deep texts from GPT-2 — we have seen it all.
This time I wanted to create a neural entity that would act like a beauty blogger. This meant it would have to post pictures like Instagram influencers do and generate the same kind of narcissistic texts.
Initially I planned to post the neural content on Instagram but using the Facebook Graph API which is needed to go beyond read-only was too painful for me. So I reverted to Telegram which is one of my favorite social products overall.
The name of the entity/channel (Aida Enelpi) is a bad neural-oriented pun mostly generated by the bot itself.
https://guitargz.github.io/posts/202104151136-neural-network-telegram-bot/
#neural #network #telegram #bot
📡 @nogoolag 📡 @blackbox_archiv
UK government intervenes in Nvidia takeover of chip designer Arm
The UK government has intervened in the sale of computer chip designer Arm Holdings to a US company on national security grounds.
Japan's SoftBank intended to sell the UK tech company to Nvidia for about $40bn (£29.5bn).
But Digital Secretary Oliver Dowden said he wanted the UK's competition watchdog to assess its implications.
"Following careful consideration of the proposed takeover, I have today issued an intervention notice," he said.
"As a next step and to help me gather the relevant information, the UK's independent competition authority will now prepare a report on the implications of the transaction, which will help inform any further decisions."
Arm's technology is at the heart of most smartphones and smart devices, underpinning processors made by Apple, Samsung and Huawei.
In January, the Competition and Markets Authority (CMA) announced it was looking into the takeover amid concerns it could lead Arm to withdraw, raise prices or reduce the quality of its intellectual property licensing services to Nvidia's rivals.
But Mr Dowden has now ordered it to begin a "phase one" investigation, which will decide whether a full "phase two" investigation is needed that could lead to the deal being blocked.
The CMA will have until 30 July to submit its findings to the digital secretary.
https://www.bbc.co.uk/news/business-56804007
#nvidia #takeover #arm
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The UK government has intervened in the sale of computer chip designer Arm Holdings to a US company on national security grounds.
Japan's SoftBank intended to sell the UK tech company to Nvidia for about $40bn (£29.5bn).
But Digital Secretary Oliver Dowden said he wanted the UK's competition watchdog to assess its implications.
"Following careful consideration of the proposed takeover, I have today issued an intervention notice," he said.
"As a next step and to help me gather the relevant information, the UK's independent competition authority will now prepare a report on the implications of the transaction, which will help inform any further decisions."
Arm's technology is at the heart of most smartphones and smart devices, underpinning processors made by Apple, Samsung and Huawei.
In January, the Competition and Markets Authority (CMA) announced it was looking into the takeover amid concerns it could lead Arm to withdraw, raise prices or reduce the quality of its intellectual property licensing services to Nvidia's rivals.
But Mr Dowden has now ordered it to begin a "phase one" investigation, which will decide whether a full "phase two" investigation is needed that could lead to the deal being blocked.
The CMA will have until 30 July to submit its findings to the digital secretary.
https://www.bbc.co.uk/news/business-56804007
#nvidia #takeover #arm
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
BBC News
UK government intervenes in Nvidia takeover of chip designer Arm
The government is to examine Nvidia's planned purchase of the UK firm on national security grounds.
Some Rogers wireless customers hit by outages across Canada
Several police forces warn not to hang up if you call 911, because they can't call back.
Rogers says some wireless customers Canada-wide are experiencing intermittent service interruptions for both voice and data services.
"Our team is working quickly to restore services as soon as possible," Rogers said in a message on its help site Monday. "We apologize for the inconvenience and will continue to provide regular updates."
The site describes the outages as "Canada-wide" and ongoing. The outage is also affecting Fido customers.
The website Downdetector was showing Rogers outages beginning overnight and spiking to more than 12,000 reports in the daylight hours. The outages appeared most prevalent in southern Ontario and Montreal.
Social media had many posts of people struggling with the outage.
https://www.cbc.ca/news/business/rogers-outage-1.5992954
https://www.cbc.ca/news/business/rogers-outage-1.5992954
#canada #rogers #outage
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Several police forces warn not to hang up if you call 911, because they can't call back.
Rogers says some wireless customers Canada-wide are experiencing intermittent service interruptions for both voice and data services.
"Our team is working quickly to restore services as soon as possible," Rogers said in a message on its help site Monday. "We apologize for the inconvenience and will continue to provide regular updates."
The site describes the outages as "Canada-wide" and ongoing. The outage is also affecting Fido customers.
The website Downdetector was showing Rogers outages beginning overnight and spiking to more than 12,000 reports in the daylight hours. The outages appeared most prevalent in southern Ontario and Montreal.
Social media had many posts of people struggling with the outage.
https://www.cbc.ca/news/business/rogers-outage-1.5992954
https://www.cbc.ca/news/business/rogers-outage-1.5992954
#canada #rogers #outage
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
CBC
Rogers says service starting to return after Canada-wide wireless outage | CBC News
Rogers said wireless voice and data services have started returning to its customers Monday evening after a lengthy outage the company's chief technological officer said was caused by a software issue.
This Company Monitors Prisoners In Xinjiang. It Won An “Innovation” Award At An Event Sponsored By Amazon
The Chinese government’s use of prisons and detention camps in Xinjiang is part of what the US and other countries have called a genocide.
With an Amazon logo behind him and luminaries from Shanghai’s booming venture capital scene in front of him, the executive onstage delivered his pitch. His company, Renwei Electronics, helps authorities in China track prisoners and detainees — alerting guards to their movements and even fitting them with heart rate monitors.
Renwei deploys its “smart prison” system in China’s Xinjiang region, where more than 1 million Muslim minorities have been locked up.
Yet this did not interfere with the warm welcome for Renwei at an event cohosted by an Amazon-backed “joint innovation center” in November. Event organizers gave Renwei’s executive a platform to deliver an “investor road show”–style speech to some of China’s most prestigious investors. And Renwei received a “product innovation award” recognizing it as one of six “outstanding entrepreneurial companies.”
Sent a detailed list of questions, Amazon declined to comment on the record. Renwei did not respond to a request for comment.
A growing list of multinational corporations are under pressure to move their supply chains away from Xinjiang, amid mounting evidence of mass detention and forced labor there, as part of what the US and other countries have recently called a genocide. Congress is considering a bill banning imports from Xinjiang tainted by forced labor, and US customs have already banned products made from tomatoes and cotton in the region, among other goods.
Amazon shut down its e-commerce business in China in 2019, but other parts of its sprawling empire still work with Chinese customers, including its highly profitable cloud computing subsidiary, Amazon Web Services.
https://www.buzzfeednews.com/article/meghara/amazon-xinjiang-prison-surveillance-award
#china #renwei #amazon #DeleteAmazon #xinjiang #prison #surveillance #thinkabout #why
📡 @nogoolag 📡 @blackbox_archiv
The Chinese government’s use of prisons and detention camps in Xinjiang is part of what the US and other countries have called a genocide.
With an Amazon logo behind him and luminaries from Shanghai’s booming venture capital scene in front of him, the executive onstage delivered his pitch. His company, Renwei Electronics, helps authorities in China track prisoners and detainees — alerting guards to their movements and even fitting them with heart rate monitors.
Renwei deploys its “smart prison” system in China’s Xinjiang region, where more than 1 million Muslim minorities have been locked up.
Yet this did not interfere with the warm welcome for Renwei at an event cohosted by an Amazon-backed “joint innovation center” in November. Event organizers gave Renwei’s executive a platform to deliver an “investor road show”–style speech to some of China’s most prestigious investors. And Renwei received a “product innovation award” recognizing it as one of six “outstanding entrepreneurial companies.”
Sent a detailed list of questions, Amazon declined to comment on the record. Renwei did not respond to a request for comment.
A growing list of multinational corporations are under pressure to move their supply chains away from Xinjiang, amid mounting evidence of mass detention and forced labor there, as part of what the US and other countries have recently called a genocide. Congress is considering a bill banning imports from Xinjiang tainted by forced labor, and US customs have already banned products made from tomatoes and cotton in the region, among other goods.
Amazon shut down its e-commerce business in China in 2019, but other parts of its sprawling empire still work with Chinese customers, including its highly profitable cloud computing subsidiary, Amazon Web Services.
https://www.buzzfeednews.com/article/meghara/amazon-xinjiang-prison-surveillance-award
#china #renwei #amazon #DeleteAmazon #xinjiang #prison #surveillance #thinkabout #why
📡 @nogoolag 📡 @blackbox_archiv
BuzzFeed News
This Company Monitors Prisoners In Xinjiang. It Won An “Innovation” Award At An Event Sponsored By Amazon.
The Chinese government’s use of prisons and detention camps in Xinjiang is part of what the US and other countries have called a genocide.
Forwarded from XiaomiTime: Xiaomi & HyperOS News (Erdil Sualp BAYRAM)
It has come to our attention that the MIUI custom rom Minovo which demands illegitimate payment for code they stole from MIUI contains code used for phishing of their users personal data such as usernames, password and credit card details.
If you have installed Minovo, remove it immediatly, change your passwords and keep an eye on your bank account. If you have paid for it, try to get a refund. Please spread the news and draw the attention of other users of this rom on the matter.
CC @RedmiK20Updates
#SNFP
🔗 @xiaomiui | TR | Chat | PT | @miui_download | @xiaomiuimods | Update Chat | App | Instagram | Twitter | YouTube
If you have installed Minovo, remove it immediatly, change your passwords and keep an eye on your bank account. If you have paid for it, try to get a refund. Please spread the news and draw the attention of other users of this rom on the matter.
CC @RedmiK20Updates
#SNFP
🔗 @xiaomiui | TR | Chat | PT | @miui_download | @xiaomiuimods | Update Chat | App | Instagram | Twitter | YouTube
Using a Raspberry Pi to hack grandma (Part2)
One Raspberry Pi, two red teamers and a simple mission: hack grandma.
After building a Raspberry Pi “attack box”, of course I want to kick the wheels and take it for a spin before I get called into my next red team operation.
But what to do?
I could do the normal thing and ping our CEO Spencer Thompson and do a basic web penetration test against our site. But our site is pretty limited and doesn’t offer a lot of “meat” to go after. Plus, I’ve done about a million of these so I want to try something new.
Part of being a red teamer means being creative. Thinking outside of the box. Ideas, ideas, ideas…
I’ve got it! With the world shut down and everyone working from home, what if I plug my Raspberry Pi into my home network and see if I can gain a foothold onto one of my in-law’s devices! They’ve been staying with us to help take care of James, my 8-month old son. Challenge accepted.
https://feed.prelude.org/p/easy-as-pi
👉🏼 How to build a disposable attack box using a Raspberry Pi
https://t.iss.one/BlackBox_Archiv/1937
#disposable #attackbox #grandma #raspberry
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
One Raspberry Pi, two red teamers and a simple mission: hack grandma.
After building a Raspberry Pi “attack box”, of course I want to kick the wheels and take it for a spin before I get called into my next red team operation.
But what to do?
I could do the normal thing and ping our CEO Spencer Thompson and do a basic web penetration test against our site. But our site is pretty limited and doesn’t offer a lot of “meat” to go after. Plus, I’ve done about a million of these so I want to try something new.
Part of being a red teamer means being creative. Thinking outside of the box. Ideas, ideas, ideas…
I’ve got it! With the world shut down and everyone working from home, what if I plug my Raspberry Pi into my home network and see if I can gain a foothold onto one of my in-law’s devices! They’ve been staying with us to help take care of James, my 8-month old son. Challenge accepted.
https://feed.prelude.org/p/easy-as-pi
👉🏼 How to build a disposable attack box using a Raspberry Pi
https://t.iss.one/BlackBox_Archiv/1937
#disposable #attackbox #grandma #raspberry
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
feed.prelude.org
Easy as Pi
A Raspberry Pi. Two red teamers. One mission: hack grandma
This media is not supported in your browser
VIEW IN TELEGRAM
Nextdoor launches anti-racism notification to prevent discriminatory language
Nextdoor is introducing a new anti-racism notification, which asks users to reconsider posting content if the app thinks it may be offensive. As with its previous Kindness Reminder, if a user tries to post something with words or phrases Nextdoor thinks may be objectionable, it will give them the option to edit the post before it actually goes live. The users can, however, ignore the warning and post it anyway.
https://blog.nextdoor.com/2021/04/19/nextdoor-launches-anti-racism-notification-to-prevent-discriminatory-language/
https://www.theverge.com/2021/4/19/22392304/nextdoor-anti-racism-notification-community-moderation
https://www.youtube.com/watch?v=0yLUWsZp5Ug
#nextdoor #racist #antiracism #notification #discriminatory #language #video #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Nextdoor is introducing a new anti-racism notification, which asks users to reconsider posting content if the app thinks it may be offensive. As with its previous Kindness Reminder, if a user tries to post something with words or phrases Nextdoor thinks may be objectionable, it will give them the option to edit the post before it actually goes live. The users can, however, ignore the warning and post it anyway.
https://blog.nextdoor.com/2021/04/19/nextdoor-launches-anti-racism-notification-to-prevent-discriminatory-language/
https://www.theverge.com/2021/4/19/22392304/nextdoor-anti-racism-notification-community-moderation
https://www.youtube.com/watch?v=0yLUWsZp5Ug
#nextdoor #racist #antiracism #notification #discriminatory #language #video #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Social Media ‘Likes’ Change the Way We Feel About Our Memories
Summary: Sharing our personal experiences on social media may negatively impact how we feel about our memories, especially if the post doesn’t get many likes, a new study reports.
Memories are often considered very personal and private. Yet, in the past few years, people have got used to notifications from social media or phone galleries telling them they have a “memory”.
These repackaged versions of the past affect not just what we remember but also the attachments we have with those memories. In a new study, we found social media has the potential to change how people feel about their memories.
Social media metrics such as Facebook “likes” can negatively impact how people feel about certain memories, especially if these memories are shared without getting many likes. Beyond this, the anticipation of social media judgements about the past can also impact on what memories people share and how.
With the aim of understanding the everyday presence of these automated memories, we drew upon detailed interviews and focus groups with around 60 social media users. In particular, we looked at how people use features such as Timehop, Facebook memories and Apple memories.
We asked participants about their experiences of being reminded of memories by these different features. While some found the features to be creepy and invasive, others found them a useful reminder of previous experiences they’d forgotten.
We also asked whether the number of likes a shared memory received had any impact on them. In some cases participants felt differently about their memories depending on the number of likes.
https://neurosciencenews.com/memory-social-media-18263/
#social #media #facebook #DeleteFacebook #likes #memories #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Summary: Sharing our personal experiences on social media may negatively impact how we feel about our memories, especially if the post doesn’t get many likes, a new study reports.
Memories are often considered very personal and private. Yet, in the past few years, people have got used to notifications from social media or phone galleries telling them they have a “memory”.
These repackaged versions of the past affect not just what we remember but also the attachments we have with those memories. In a new study, we found social media has the potential to change how people feel about their memories.
Social media metrics such as Facebook “likes” can negatively impact how people feel about certain memories, especially if these memories are shared without getting many likes. Beyond this, the anticipation of social media judgements about the past can also impact on what memories people share and how.
With the aim of understanding the everyday presence of these automated memories, we drew upon detailed interviews and focus groups with around 60 social media users. In particular, we looked at how people use features such as Timehop, Facebook memories and Apple memories.
We asked participants about their experiences of being reminded of memories by these different features. While some found the features to be creepy and invasive, others found them a useful reminder of previous experiences they’d forgotten.
We also asked whether the number of likes a shared memory received had any impact on them. In some cases participants felt differently about their memories depending on the number of likes.
https://neurosciencenews.com/memory-social-media-18263/
#social #media #facebook #DeleteFacebook #likes #memories #thinkabout
📡 @nogoolag 📡 @blackbox_archiv
Neuroscience News
Social Media ‘Likes’ Change the Way We Feel About Our Memories
Sharing our personal experiences on social media may negatively impact how we feel about our memories, especially if the post doesn't get many likes, a new study reports.
Improving Cognitive Health in COVID-19 Survivors Through Digital Therapeutics - Clinical Trial Details
The primary objective of this study is to investigate the efficacy of AKL-T01, a remotely-delivered digital cognitive intervention, relative to a waitlist control in improving cognitive functioning in COVID-19 survivors.
Emerging evidence suggests a subgroup of survivors of COVID- 19 have residual difficulties with cognition and daily functioning. These deficits are pronounced in cognitive domains including attention, learning and executive skills, and may continue to impact quality of life after recovery from other COVID-19 symptoms. This study aims to investigate the efficacy of AKL-T01 (Akili Interactive), a remotely-delivered digital cognitive intervention, in targeting and improving cognition and functional outcomes in individuals recovering from COVID-19. The efficacy of the AKL-T01 intervention will be measured relative to a waitlist control group.
https://jcto.weill.cornell.edu/open_clinical_trials/improving-cognitive-health-in-covid-19-survivors-through-digital-therapeutics
https://www.theverge.com/2021/4/19/22391587/long-covid-brain-cognitive-treatment-video-game-akili
#clinical #digital #therapeutics #covid #brain #cognitive #treatment #videogame
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
The primary objective of this study is to investigate the efficacy of AKL-T01, a remotely-delivered digital cognitive intervention, relative to a waitlist control in improving cognitive functioning in COVID-19 survivors.
Emerging evidence suggests a subgroup of survivors of COVID- 19 have residual difficulties with cognition and daily functioning. These deficits are pronounced in cognitive domains including attention, learning and executive skills, and may continue to impact quality of life after recovery from other COVID-19 symptoms. This study aims to investigate the efficacy of AKL-T01 (Akili Interactive), a remotely-delivered digital cognitive intervention, in targeting and improving cognition and functional outcomes in individuals recovering from COVID-19. The efficacy of the AKL-T01 intervention will be measured relative to a waitlist control group.
https://jcto.weill.cornell.edu/open_clinical_trials/improving-cognitive-health-in-covid-19-survivors-through-digital-therapeutics
https://www.theverge.com/2021/4/19/22391587/long-covid-brain-cognitive-treatment-video-game-akili
#clinical #digital #therapeutics #covid #brain #cognitive #treatment #videogame
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
jcto.weill.cornell.edu
Improving Cognitive Health in COVID-19 Survivors Through Digital Therapeutics | Joint Clinical Trials Office
The primary objective of this study is to investigate the efficacy of AKL-T01, a remotely-delivered digital cognitive intervention, relative to a waitlist control in improving cognitive functioning in COVID-19 survivors.